Someone just spun up a production EC2 instance, and suddenly nobody can find which logs belong to which workload. You need visibility, not another dashboard tab. That is where EC2 Systems Manager and Elastic Observability come together to turn raw AWS metadata into meaningful operational insight.
EC2 Systems Manager (SSM) gives teams consistent, policy-driven control of instances. It handles patching, access, and automation without SSH keys floating around in Slack. Elastic Observability, on the other hand, ingests and visualizes operational data from logs, metrics, and traces. When you connect them, you stop chasing instance IDs and start detecting patterns across environments in near real-time.
The integration starts with data flow. SSM Agents already live on EC2 nodes, securely communicating with the SSM API through AWS Identity and Access Management (IAM). Elastic Observability can then collect and correlate SSM-managed telemetry, mapping it to services instead of hostnames. Use IAM roles with scoped permissions so Elastic only reads what it must, never writes unless you intend it. That small boundary is what turns a monitoring stack into an auditable control plane.
Automation makes it repeatable. Create an SSM automation document that sends CloudWatch metrics or logs into Elastic. Add tags to contextualize data per environment or application. Once configured, every new instance enrolled in Systems Manager will self-register into your Elastic observability cluster. Repeatability without a human checklist is the highest form of compliance.
Before you declare success, tighten the bolts. Audit IAM policies, rotate API keys regularly, and use identity federation via Okta or another OIDC provider to control dashboard access. If Elastic alerts are flooding Slack, group rules by service namespace so you see real signals instead of noise.